BUSINESS TECHNOLOGY MEDIA COMPANY
Companies
Sectors
white paper
1:00

White paper: We need to talk about labour scheduling

Thinking about, and addressing, the challenge of labour scheduling.

0:30

White paper: Eight simple steps for automating GRC

Slash audit costs, improve efficiency and minimise risk.

0:40
Aug 4, 2021

White paper: The role of conversation analytics in creating the next-gen CIO

How CIOs can transform their business by equipping departments enterprise-wide with customer data.

0:40
Aug 2, 2021

White paper: Biometrics for telecoms

Improving customer authentication and fraud prevention.

0:40
Jul 5, 2021

White paper: Cloudera solves streaming problems

Gaining access to streaming data for immediate processing requires special skills.

1:00
Jul 2, 2021

White paper: Xerox ConnectKey Remote Control Panel

A Web-enabled Remote Control Panel feature is available on all Xerox ConnectKey Controller-based products and may be accessed as a client from any IP connected workstation.

0:30
Jun 30, 2021

White paper: GPS for authentication

Is the juice worth the squeeze?

1:20
Jun 24, 2021

White paper: The CEO and ERP solutions

The fundamental importance of having an ERP system is to use software as a tool to take complexity out of daily operations.

1:30
Jun 23, 2021

Whitepaper: Detecting and stopping ransomware attacks with AI

Examining how aiSIEM/aiXDR detects and stops ransomware and other types of malware associated with ransomware attacks.

0:40

White paper: Digitising a payroll system

CRS examines the requirements of a digital payroll environment and explores the business cost of implementation.

0:40
Jun 1, 2021

White paper: Xerox Next Generation Security: Partnering with McAfee

MFP devices potentially represent a serious risk to your network and enterprise systems if they are not adequately protected.

0:40
Jun 1, 2021

White paper: Cloud security monitoring on AWS

A number of cloud-native security controls are available in Amazon Web Services to help security engineers implement technical controls for continuous security monitoring.

Related topics